1 00:00:01,530 --> 00:00:08,600 One number 9 absolute anonymity isn't practical in real life or on the web. 2 00:00:10,380 --> 00:00:14,540 Many users think that the internet gives them anonymity. 3 00:00:14,670 --> 00:00:19,860 They think they can express their opinions on internet forums without restraint or do things they wouldn't 4 00:00:19,860 --> 00:00:20,910 normally do. 5 00:00:23,070 --> 00:00:26,980 Actually it's much easier to identify someone on the web than in real life. 6 00:00:28,740 --> 00:00:32,550 Internet communication is governed by certain modifiable rules. 7 00:00:34,830 --> 00:00:39,370 Internet protocols are designed in such a way that it's impossible to stay anonymous on the web. 8 00:00:40,540 --> 00:00:45,730 You can try to hide your identity through proxy servers or Anniyan routing. 9 00:00:45,800 --> 00:00:50,660 Let's analyze the mechanisms behind these solutions that can help you achieve internet anonymity. 10 00:00:53,270 --> 00:00:58,790 Proxy servers or intermediary servers are used to pass your computer's requests when for example you 11 00:00:58,790 --> 00:01:07,220 try to connect to the Internet the proxy server connects to a target server the web server administrator 12 00:01:07,220 --> 00:01:09,250 can see the connection attempt in the logs. 13 00:01:09,470 --> 00:01:11,460 But it's a connection from the proxy. 14 00:01:13,270 --> 00:01:20,300 If you used an anonymous proxy server it attempt to track down the connection what ended the proxy a 15 00:01:20,330 --> 00:01:25,430 person who wanted to discover who for instance insulted him or her on the Internet would find the proxy 16 00:01:25,460 --> 00:01:27,200 and the trail would end. 17 00:01:27,230 --> 00:01:30,800 That's the theory. 18 00:01:30,910 --> 00:01:32,860 In practice it looks slightly different. 19 00:01:33,960 --> 00:01:39,690 Even an anonymous proxy server which doesn't require you to sign in is managed by an administrator 20 00:01:42,440 --> 00:01:45,520 this person knows who established a connection with the proxy. 21 00:01:47,130 --> 00:01:52,920 So proxies make it more difficult but not impossible to trace you. 22 00:01:53,030 --> 00:01:56,650 It's more difficult when you use a proxy located in other countries. 23 00:01:58,370 --> 00:02:02,330 Then you can be sure that the administrator of the proxy you use speaks a different language than the 24 00:02:02,330 --> 00:02:04,080 people who want to track you down. 25 00:02:05,910 --> 00:02:09,800 Nevertheless it's still basically a cover up operation. 26 00:02:13,970 --> 00:02:18,410 More popular and more universal cover up technique is called onion routing. 27 00:02:18,590 --> 00:02:20,570 Its aim is to confuse the receiver. 28 00:02:22,330 --> 00:02:26,350 The more machines exchange the message before it's sent and the target the harder it will be to track 29 00:02:26,350 --> 00:02:27,130 its path. 30 00:02:28,720 --> 00:02:30,710 It's easy to implement this technique. 31 00:02:36,330 --> 00:02:42,580 There are programs that will automatically change your IP address. 32 00:02:42,630 --> 00:02:45,010 This is achieved through a virtual tunneling network. 33 00:02:46,930 --> 00:02:51,790 This technique is so complicated that even people who set up and are part of the network are unable 34 00:02:51,790 --> 00:02:56,310 to trace the path the messages travel. 35 00:02:56,380 --> 00:03:00,060 Otherwise someone could connect to the network and use it for their own purposes. 36 00:03:02,200 --> 00:03:09,000 In such a network each computer knows the address of its immediate virtual neighbor only each terminal 37 00:03:09,000 --> 00:03:13,620 is encrypted with a temporary session key which makes it impossible to track the packet once it's been 38 00:03:13,620 --> 00:03:23,180 sent by the neighboring computer the network is constantly being rebuilt onion routing prevents the 39 00:03:23,180 --> 00:03:27,510 target server from tracking down the original sender in a clump of virtual nodes. 40 00:03:29,080 --> 00:03:34,920 It also enables you to regularly change the computer's settings in a random way. 41 00:03:34,950 --> 00:03:39,660 Nevertheless such anonymity is only illusory. 42 00:03:39,740 --> 00:03:45,110 It's obvious enough that a message or a blog post must have an author although it may be difficult to 43 00:03:45,110 --> 00:03:49,530 trace the message path from the computer to the server. 44 00:03:49,600 --> 00:03:51,620 The ninth security is still valid.